wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 29 people, some anonymous, worked to edit and improve it over time.

wikiHow marks an article as reader-approved once it receives enough positive feedback. This article has over 395,631 views and 85% of readers who voted found it helpful, earning it our reader-approved status.
Learn more...

Ever had the feeling you were being watched? If you think you're under surveillance, you're probably experiencing a lot of stress. How can you tell who to trust? With a little awareness, you can probably determine whether or not the threat is real or in your head. See Step 1 below to learn how to spot and lose tails, check if your phone is being monitored, and protect your emails.

Steps

Method1

Checking for Tails

1

Ask yourself why you would be followed. Tailing someone takes time and resources, and most local authorities won't waste time trying to tail average citizens. Private investigators and angry exes are a different matter. Before you start getting paranoid, ask yourself if you actually have anything to fear.

2

Be aware. The main key to identifying tails is to stay aware of your surroundings at all time. Don't keep your nose stuck in your phone; keep your eyes up and monitoring the world around you. If you're not paying attention, you'll never know if you're being followed.[1]

3

Avoid looking over your shoulder. When you start acting suspicious, your tail will notice and either drop back or stop in order to try again later. If you feel like you're being followed, keep acting like you don't know.

4

Slow your pace. This applies to both walking and driving. If you're walking, slow down and look in some store windows or at your phone. Make sure to keep one eye on your surroundings while doing so. If you're driving, move over to the slow lane and drive the speed limit.

5

Call the police. If you think you are legitimately being followed and that you are in danger, you should call the police immediately. Try to stay in crowded, public areas while you wait for local law enforcement to respond

Large crowds can help you identify the person tailing you so that you can give the description to the police.

If you call the police and a local undercover is following you, it will usually back off. If it is a state or federal officer tailing you, then they will likely get pulled over by the local police. If it is a private investigator, they may get ticketed and you may be informed as to what was happening.

6

Avoid panicking. If you think you're being followed, the worst thing you can do is start running or driving erratically. Not only does this alert the people that are following you, but it can put you in danger of an accident.

7

Change your patterns. Get off at an exit and then get immediately back on the freeway. If you're walking, walk around the block once or twice. This will usually throw off the person tailing you, or at least make them aware that you're aware.

8

Don't follow the follower. Some people suggest that you tail the person that is tailing you in order to get a better idea of who they are, but this is generally not a good idea and can be very dangerous.

Method2

Knowing if Your Phone is Tapped

1

Understand how spy software works. Spy software is installed on a smartphone without the user's knowledge. It can then send back GPS location, phone conversations, text messages and more. It is incredibly unlikely that your phone has spy software installed on it by a malicious party, but these steps will help you make sure.

2

Check your phone's behavior. Is your phone acting oddly? Is it lighting up when you're not using it, shutting down randomly, or making beeping noises? All phones will act oddly sometimes, but if this behavior is consistent then you may have spy software installed.

3

Monitor your battery. Many spy programs will increase the drain on your battery. It can be difficult to notice, especially since your phone's battery will naturally become less efficient over time. Look for dramatic shifts in battery life, as these will be more indicative of a program draining it.

4

Check for background noise during calls. A lot of times, background noise is a natural by-product of low-quality cellular service, but if you consistently hear static, clicking, and beeping noises during conversations they could potentially be signs of recording software. This is because some call recording software acts like a conference call.

5

Look for strange texts. Many spy programs are controlled remotely via coded texts. When the program is not functioning properly, these texts may appear in your inbox. If you are receiving texts with random collections of letters and numbers, your phone may be infected with spy software.

6

Check your data usage. Many spy programs, especially cheaper ones, will use your service's data plan to send out the information that it collected. Use a data management app to track what apps are using data and how much they are using. If you are sending out data that you cannot account for, you may have spy software installed.

7

Check for a jailbreak. If you are using an iPhone, the only way to have spy software installed is if your phone has been jailbroken. Look for the Installer, Cydia, or Icy apps on your Home screens. If you see any of these apps or apps that were installed from sources other than the Apple App Store, then your phone has been jailbroken and spy software may have been installed.[2]

You can easily revert a jailbreak by restoring your iPhone. This will remove all apps that rely on the phone being jailbroken, which means all spy programs will be disabled. See this guide for detailed instructions on restoring your iPhone.

8

Use misdirection. If you feel like your conversations are being monitored by someone you know, one way to trap them is to deliberately spread misinformation. Call a trusted friend and tell them something believable but false, either about your schedule, your life, or anything else. If you later discover that people you know have come into this information, you'll know that someone was listening in.[3]

Method3

Checking for Email and Computer Monitoring

1

Assume that all workplace computer use is monitored. Most large companies have workplace computer use agreements that allow them to monitor the sites you visit, the emails you send, and the programs you run. Check with your IT department if you want to see the details of the agreement, but assume that nothing you do at work is private.

2

Check for keyloggers. Keyloggers are programs that capture every keystroke you make on your computer. They can be used to reconstruct emails and steal passwords. Keyloggers run in the background, and don't have icons in the system tray or other obvious signs that they are working.

If you are using Windows, press Ctrl+⇧ Shift+Esc to open the Task Manager. Look in the Process or Background Processes section, and make note of any unfamiliar processes. Google anything that is unfamiliar to see if there are keylogging programs installed.

If you are using a Mac, open the Activity Monitor. You can find this program in the Utilities subfolder of your Applications folder. Look through all of the active processes and note any that are unfamiliar. Use Google to find out if they are malicious or not.

Keylogger processes often take up a lot of resources as they have to track a significant amount of information.

3

Install your own email tracking software. Programs like ReadNotify and GetNotify embed small, invisible images in your email that allow you to see when the email was opened, where it was opened, how long it was opened for, and if it was forwarded. This can be very useful if you believe that someone is intercepting your messages, as you can track the IP addresses that open the email.[4]

4

Use encrypted email. If you're really worried about people reading your email who shouldn't be, you can switch to an encrypted email client. Your email will be encrypted, and only recipients that you designate will be able to decode it. It can be a bit of a hassle to set up, but is essential if you are trying to protect highly sensitive information. See this guide for instructions on setting up encrypted email.

Community Q&A

What do I do if a van with no number plate is outside my house, but leaves before the police arrive?

Technical_Difficulties

Community Answer

Before you call the police, note what the van looks like. Even if it has no number plates, get the color, the make, and any significant details (e.g. different colored wheels). When you call the police, tell them your address, the situation, and your description of the van. Tell them that it has no number plates. That way, the police can patrol the area and look for it.

First, start keeping records of everything strange that you think could be a sign of him spying on you, including what he's doing, when he's doing it, anything he may have said to you, etc. If you feel like you have enough evidence, you can go to the police and press charges. If you're uncomfortable with his behavior but don't want to (or can't) press criminal charges, I would start looking for somewhere new to live.

Pick up the phone the next time that they call you and ask who it is. It very well could just be someone who has the wrong number. If it isn't someone who is calling the wrong number and they keep harassing you, block the number. If you feel unsafe after doing this for whatever reason, contact the police.

Listen for a loud humming noise if you can't see the drone. If you can see it, then try running. If the drone follows you, it is probably spying on you. Also, see if the drone hovers in one spot for a long time or hardly moves.

How do I stop an investigator or someone I know from getting my credit card statements on line?

Community Answer

Unfortunately, if it's an investigator, they can collect your information and data whether you allow them to or not. There's no way to be able to block them. Look up: "government monitoring of citizens."

To figure out if you’re under surveillance, check for tails by slowing down while you’re walking or driving and checking to see if somebody mirrors your behavior. You can also change your patterns by walking or driving around a block twice, for example, to see if you're being followed. When you use your phone, listen for background noise, which can indicate that your phone is being tapped. Also, monitor your phone for data usage to see if it seems excessive, since spy programs can use your data to send information back to the person surveilling you. For more tips on determining whether you’re under surveillance, including checking your computer for keylogger software, keep reading!

Did this summary help you?

Made Recently

Article Info

wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 29 people, some anonymous, worked to edit and improve it over time.